re-design the otp tool to use a more secure chain to authenticate other than ldap password

Comments

  • Failure to properly security the authentication used to enroll TOTP, etc via this Desktop OTP Tool creates a high risk vulnerability in the product that your customers have to then assume, as it creates a single-factor entry point to enroll second factor methods. If a user's password has been phished, now the attacker can compromised 2nd factor registrations, and then use both to access even more sensitive areas of your network that are "protected" by this MFA platform.